Vercel, the cloud platform for frontend developers, disclosed a significant security breach on April 20, 2026, originating from a compromised third-party AI analytics tool, Context.ai. The incident resulted in unauthorized access to Vercel’s internal systems and the exposure of sensitive data belonging to a subset of its customer base. According to the official security advisory released by Vercel, the breach was facilitated through a vulnerability in the Context.ai integration, which Vercel utilized for internal product telemetry and user behavior analysis.

The investigation conducted by Vercel’s security operations center (SOC) determined that the breach began at approximately 02:15 UTC on April 20. Attackers exploited a remote code execution (RCE) vulnerability in Context.ai version 2.4.1, which allowed them to harvest administrative API tokens. These tokens were subsequently used to gain unauthorized access to Vercel’s internal metadata service. Vercel reported that the attackers maintained access for approximately 14 hours before the intrusion was detected and neutralized at 16:20 UTC.

The breach impacted approximately 1,200 enterprise-tier accounts, which constitutes roughly 0.4% of Vercel’s total active user base. The exposed data included encrypted environment variables, deployment configuration files, and OAuth tokens for integrated version control systems, including GitHub, GitLab, and Bitbucket. Vercel emphasized that while the environment variables were encrypted at rest, the attackers gained access to the decryption keys stored within the compromised telemetry environment. This allowed for the potential decryption of sensitive secrets associated with those specific enterprise projects.

In response to the incident, Vercel initiated an emergency global secret rotation at 17:00 UTC. The company confirmed that its core infrastructure, including the Vercel Edge Network and the global CDN, remained secure and was not accessed during the breach. No downtime was reported for customer-facing websites or applications hosted on the platform. Vercel’s Chief Information Security Officer (CISO) stated that the company has since deprecated the use of Context.ai and is moving toward a more restrictive zero-trust framework for all third-party AI service integrations.

Context.ai issued a parallel statement acknowledging the compromise and confirming that the vulnerability has been patched in version 2.4.2 of their software. The AI firm stated that the breach was limited to a specific cluster of their analytics engine. Vercel has advised all affected customers to immediately rotate any sensitive credentials, such as database connection strings and API keys, that were stored as environment variables. The company is providing affected users with detailed logs of the unauthorized access to assist in their internal remediation efforts. Vercel has also committed to a third-party security audit of all remaining external integrations.